About ICCMI

Aim and Scope

The International Conference on Cybersecurity and Machine Intelligence (ICCMI) aims to address the growing threat of cyber-attacks by bringing together experts in the field of cybersecurity and machine intelligence. Over the past few decades, cyber threats have increased significantly, and attacks usually occur in a series of stages, including reconnaissance, gaining access, and cover-up. These attacks can take many forms, including wireless, malicious code, and phishing attacks. Large-scale attacks such as viruses, worms, and spam are not targeted, so implementing risk management strategies to protect computing systems from vulnerabilities and cyber-attacks is crucial.

To combat cyber-attacks, the use of artificial intelligence (AI) and machine learning (ML) technology has become increasingly popular in cybersecurity applications.

These applications cover areas such as malware analysis, threat analysis, zero-day attacks, and anomaly-based intrusion detection. However, the use of machine intelligence in cybersecurity is subject to certain constraints, such as the need for greater transparency of models, extensive and varied datasets, and the explication of outcomes. Ethical considerations also play a significant role when employing machine intelligence in cybersecurity.

As recent advancements in malware and attack techniques have made it more challenging to detect and analyze attacks, more than conventional methods of detecting and analyzing malware is needed to keep up with the constantly evolving landscape of novel attacks and their variations. Therefore, the ICMI aims to bring together leading experts in the field to explore the potential of machine learning in cybersecurity, enhance its effectiveness, and overcome the challenges facing its adoption.

The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of AI, ML, and cyber security, that concern organizations, and individuals, thus creating new research opportunities. Moreover, the conference program will include various tracks, special sessions, invited talks, presentations from international community researchers, and keynote speeches. We anticipate this conference opening a new entrance for further research and technology improvements in this important area.

Topics

We solicit original research and technical papers not published elsewhere. The papers can be theoretical, practical and application oriented on the following conference tracks but not limited to:

  • Machine learning-based malware detection and analysis

  • Zero-day attacks and their detection using machine learning

  • Anomaly-based intrusion detection and prevention using machine learning

  • Machine learning-based network security

  • Adversarial machine learning in cybersecurity

  • Explainable AI in cybersecurity

  • Machine learning-based cyber threat intelligence and information sharing

  • Deep learning-based cybersecurity solutions

  • Cybersecurity applications of natural language processing (NLP)

  • AI-powered security analytics and orchestration

  • Machine learning-based security operations center (SOC)

  • Human factors in cybersecurity and machine learning

  • Privacy-preserving machine learning in cybersecurity

  • Emerging challenges and opportunities in AI-enabled cybersecurity

  • Cybersecurity and machine learning in critical infrastructure protection